A) To gather accurate information and clarify facts B) . To immediately obtain a confession C) . To intimidate the suspect D) . To conduct a surprise raid
A) Rapid-fire questioning B) Leading questioning C) Cognitive interviewing D) Direct questioning
A) Reid technique B) Covert surveillance C) Physical intimidation D) Forceful confrontation
A) Only the elements of the crime B) Facts that may indicate involvement but not the full criminal liability C) The entire criminal act D) Their innocence
A) It must be coerced under pressure B) It must be voluntarily made C) It must be made to any person D) It must be made in front of the media
A) They are only valid if the declarant survives B) They must be notarized C) They are admissible even without corroboration if the declarant believes death is imminent D) They are inadmissible unless a judge witnesses them
A) . A statement that independently proves facts of the case B) A confession made under duress C) A statement made to influence another witness D) . A statement made to the police immediately after arrest
A) Polygraph testing B) Note-taking C) Passive observation D) Open-ended narrative
A) Immediate police confrontation B) Presence of media witnesses C) Intimidation by authorities D) Absence of threats, inducement, or coercion
A) Narrative B) Cognitive C) Informal D) Structured
A) It must be made knowingly and intelligently B) The suspect must be informed of their rights C) It must include a public apology D) . It must be voluntary
A) Conducting surveillance B) Gathering physical evidence C) Using confrontation and behavioral analysis to elicit a confession D) Encouraging suspects to lie
A) The declarant was aware death was imminent B) It was signed in front of police C) It was recorded on video D) It was written and notarized
A) Focuses on witness memory retrieval through context reinstatement B) Relies on threats to elicit statements C) Is conducted without asking questions D) Forces the suspect to provide a confession
A) Accept the statement at face value B) Verify the statement independently without coercion C) Ignore contradictions D) Use the statement only as hearsay
A) Leading questions B) Rapid questioning C) Cognitive interviewing D) Confrontational interrogation
A) Considered independent relevant statement B) Admissible in court C) Admissible in court D) Presumed involuntary and inadmissible
A) Immediately arrest anyone nearby B) Elicit the truth from a suspect C) Obtain evidence through coercion D) Publicly shame the suspect
A) Using physical pressure B) Threatening the suspect with punishment C) Conducting the interrogation in private D) Advising the suspect of their right to remain silent
A) Needs corroboration to be valid B) Given only after a court order C) Requires police supervision D) Made voluntarily and without prompting
A) Listen actively and encourage detailed narratives B) Focus on irrelevant facts C) Ask leading questions to force answers D) Interrupt the witness frequently
A) Cognitive interviewing B) Passive observation C) Reid Technique D) Direct confrontation
A) . Recording of the confession B) Threats or promises made by law enforcement C) Knowledge of rights D) Voluntary nature
A) An admission B) . A hearsay statement C) A dying declaration D) A voluntary confession
A) Was the door locked?” B) Did you see him take the money?” C) Can you describe everything that happened that day?” D) You didn’t hit anyone, right?”
A) Complete confession of guilt B) . An acknowledgment of some facts that may establish a crime but stops short of full guilt C) Statement by a third party D) Statement without any factual basis
A) Investigative B) Cognitive C) Informational D) Coercive
A) The statement is recorded immediately B) The declarant knew death was imminent C) The statement is notarized D) It is read aloud in court
A) Considered independent relevant statement B) Admissible C) Inadmissible due to coercion D) Automatically valid
A) Cognitive interviewing B) Rapid-fire questioning C) Confrontational interrogation D) Leading questions
A) Must be repeated multiple times B) Must be made publicly C) Statement must be voluntary and independent of coercion D) Must involve a police officer
A) Miranda rights B) Principle of voluntariness C) Rule against hearsay D) Doctrine of independent evidence
A) Repeating questions rapidly B) Aggressive confrontation C) Ignoring witness responses D) Friendly and neutral demeanor
A) Made without awareness of rights B) Coerced under threat C) Voluntary, knowing, and intelligent D) Given to a third party only
A) Determine if the declarant believed death was imminent B) Treat it as hearsay by default C) Require the presence of legal counsel D) Ignore the timing of the statement
A) Cognitive interviewing B) Rapid questioning C) Leading questions D) Coercive interrogation
A) Even without the declarant being present B) Only if it is corroborated C) Only if the declarant testifies D) Never
A) Admission acknowledges some facts; confession acknowledges full criminal responsibility B) Admission is given in court; confession is private C) Admission is voluntary; confession is always coerced D) Admission is always false; confession is always true
A) They require corroboration B) They must be witnessed by two officers C) . They are inadmissible unless signed D) They are exceptions to the hearsay rule
A) . It can identify deception or inconsistencies B) It makes the suspect nervous C) It substitutes for evidence D) It forces a confession
A) Coerced statement B) Hearsay C) . Admission or confession D) Leading question
A) Forced written confession B) Direct questioning with threats C) Behavioral analysis of the suspect’s story D) . Physical intimidation
A) Dying declaration B) Coerced confession C) Hearsay evidence D) Independent relevant statement
A) Speed of confession B) Presence of media C) Prior criminal record D) Voluntariness and knowledge of rights
A) Surprise questioning B) Aggressive interrogation C) Random questions without structure D) Standardized questions asked in a pre-determined order
A) Polygraph-assisted interview B) Cognitive interviewing C) Reid technique D) Public humiliation
A) Hearsay B) Admission C) Coerced statement D) Full confession
A) The requirement for a judge’s approval B) The belief that a person is unlikely to lie when facing imminent death C) The need for witnesses D) The requirement for notarization
A) Voluntary, informed, and without coercion B) Taken in a public forum C) Taken secretly with intimidation D) Taken after threats
A) Accept statements at face value B) Ignore inconsistencies C) Correlate statements with independent evidence for reliability D) Only record confessions, not admissions
A) Robbery requires prior consent of the victim; theft does not B) Robbery involves violence or intimidation; theft does not C) Theft involves intimidation; robbery does not D) Theft is committed only in commercial establishments; robbery is not
A) Killing a person to gain property B) Taking personal property by intimidation C) Breaking and entering a house D) Misappropriation or conversion of property through deceit
A) Only review surveillance footage B) ocus solely on recovering stolen property C) Forensic and medical examination with crime scene documentation D) Interview witnesses only
A) The value of the property B) Whether the property is movable or immovable C) Number of victims D) Presence of deceit or fraudulent intent
A) Establishing proof of deceit or misrepresentation B) Verifying the victim’s prior consent C) . Interviewing neighbors D) Checking fingerprints only
A) Eyewitness identification and CCTV review B) Filing an administrative report C) Seizing unrelated evidence in nearby areas D) In-depth financial profiling of the suspect
A) Use of firearms is prohibited in dwelling robbery B) Public robbery requires prior planning; dwelling does not C) Robbery in a dwelling is punishable more severely due to violation of personal security D) Only dwelling robbery requires victim testimony
A) Verbal permission from the suspect B) Court-issued warrant or lawful seizure C) Consent from neighbors D) Public announcement
A) Proving motive B) Recovering the stolen item C) Establishing prior criminal record D) Proving actual taking without consent
A) . The weather during the incident B) Physical evidence and witness statements P C) The social media accounts of neighbors D) Public opinion
A) Reclusion temporal to death B) Imprisonment of 6 months C) Community service D) Fine only
A) Theft of personal jewelry B) Kidnapping for ransom C) Taking a motor vehicle with intent to gain D) Breaking into a house
A) . Interviewing neighbors only B) Ignoring CCTV footage C) . Filing a complaint with barangay officials D) Verifying vehicle ownership and tracing its location
A) Public sentiment B) . Vehicle registration and plate number C) The suspect’s prior unrelated offenses D) . Victim’s income record
A) Type of vehicle used B) Number of suspects involved C) Location of the vehicle D) Use of physical harm or intimidation during the crime
A) nterviewing unrelated witnesses B) Reviewing traffic camera footage and GPS tracking C) Forensic analysis of tire marks D) Seizing property in nearby towns
A) Theft of livestock only B) Forgery of documents C) Selling stolen goods knowingly D) . Kidnapping for ransom
A) R.A. 9208 B) . R.A. 6539 C) . R.A. 9160 D) P.D. 1612
A) Ensure the admissibility of recovered vehicle in court B) Protect suspect’s rights C) Reduce police workload D) . Increase public awareness
A) Random public announcements B) Conducting surprise inspections only in schools C) . Surveillance and monitoring of known “hot spots D) Asking the media to report thefts
A) Illegal importation of goods B) Theft of property C) . Force, coercion, or deception for exploitation D) Simple kidnapping without intent
A) Bank account holders B) Private property owners C) Minors and women in trafficking-related sexual exploitation D) Vehicle owners
A) Arrest suspects immediately without plan B) . Locate and rescue victims safely C) . Search unrelated areas D) Ignore digital evidence
A) . Trace recruitment, transport, and exploitation stages B) . Ignore online communication records C) . Focus solely on financial transactions D) . Avoid interviewing victims
A) . R.A. 6539 B) . R.A. 9160 C) P.D. 1612 D) . R.A. 9208
A) . Ignoring forensic digital evidence B) Filing reports without rescue operations C) . Coordinating with social welfare agencies and local authorities D) Public announcements only
A) Owning a private vehicle B) Small personal spending C) . Unusually large or frequent money transfers from unknown sources D) Attending community events
A) . Identifying recruiters, victims, and financial transactions B) . Ignoring online chats C) Publicly disclosing personal data D) Monitoring unrelated social media
A) . Prevention of trafficking in persons, especially women and children B) . Only property theft C) . Vehicle carnapping D) Financial fraud
A) Ignoring financial evidence B) . Understanding and analyzing patterns of recruitment and exploitation C) Recording weather data D) . Memorizing names only
A) Layering – separating illicit funds from origin B) . Placement – introducing illicit funds into the financial system C) . Recovery – reporting to authorities D) Integration – using money for business investment
A) Exploitation B) Layering C) Placement D) Integration
A) Money is stolen physically B) Money appears legitimate for investment or business C) Assets are seized by authorities D) No financial movement occurs
A) . PD 1612 B) . RA 6539 C) . RA 9208 D) . RA 9160
A) Repeating reports B) Analyzing C) Remembering D) Memorizing laws only
A) . RA 9208 – Human Trafficking B) . RA 9160 – Anti-Money Laundering Act C) RA 10364 – Expanded Anti-Rape D) . RA 6539 – Anti-Carnapping
A) . Placement and layering B) Recovery only C) Integration only D) None of the above
A) Customer Due Diligence (CDD) and reporting of suspicious transactions B) Ignoring large transactions C) Asking media for information D) Random inspections of homes
A) . Routine payroll deposits B) Structuring transactions to avoid reporting requirements C) . Buying groceries with cash D) Small daily purchases
A) Tracing illicit money, linking to suspects, and analyzing transaction patterns B) Confiscating property randomly C) Memorizing case files only D) Ignoring financial flows
A) Multi-agency coordination, evidence tracing, forensic and financial analysis B) Filing separate complaints without coordination C) . Ignoring digital evidence D) Interviewing only neighbors
A) Ignore electronic evidence B) . Only ask victims for statements C) Seize unrelated property D) . Examine digital contracts, trace financial transfers, and interview parties involved
A) Only eyewitness statements B) . Random surveillance C) . Only weather records D) . Vehicle/asset registration, GPS tracking, financial transactions
A) Only recovering stolen property B) Arresting without warrants C) Following money trails, linking proceeds to suspects, and recovering property D) Conducting public surveys
A) Asking for public opinion B) . Filing reports without evidence C) Memorizing laws only D) Ability to analyze multiple crime patterns, link them to laws, and plan coordinated interventions
A) . Confiscating vehicles randomly B) Interviewing unrelated parties C) . Ignoring financial records D) Understanding recruitment, exploitation, and fund movement stages
A) . RA 9160 – AML B) RPC – Theft provisions only C) . PD 1612 – Anti-Fencing D) . RA 6539 – Anti-Carnapping
A) . Analytical skills to identify patterns, connections, and evidence chains B) Public speaking skills C) Only memorization of laws D) Writing press releases
A) Arrest without warrant is preferred B) Evidence must be legally obtained to ensure admissibility C) . Media exposure ensures conviction D) Public opinion can replace evidence
A) Publicize the case B) Only arrest suspects C) Only file reports D) Recover property, prosecute offenders, protect victims, and prevent recurrence |